(IN)secure magazine

# Malicious PDF: Get owned without opening
# Review: IronKey Personal
# Windows 7 security features: Building on Vista
# Using Wireshark to capture and analyze wireless traffic
# « Unclonable » RFID – a technical overview
# Secure development principles
# Q&A: Ron Gula on Nessus and Tenable Network Security
# Establish your social media presence with security in mind
# A historical perspective on the cybersecurity dilemma
# A risk-based, cost effective approach to holistic security

Origine de l’article :
http://www.net-security.org/dl/insecure/INSECURE-Mag-21.pdf